当前位置:网站首页>What should I do when my blog is attacked by hackers?
What should I do when my blog is attacked by hackers?
2022-07-26 01:19:00 【IDC industry observer】
My virtual host is regularly scanned for anti-virus , So they can quickly help customers solve any security problems -- Just like any virtual host should do . They found some malicious on a small website I run PHP file . In this article , I will show you the steps I have taken to clean up the website , So that you know what to do if it happens to you .
This is not only bad news for infected websites , It's also bad news for other websites in my account , Here's why ...
When hackers visit a website , They can use it to visit other websites , So my host took action quickly , To ensure that malicious files are under control .

This means that I have disabled access to all websites on the server , I did install a security plug-in , But there is really no security plug-in that can provide complete protection .
There are many reasons for this , But it is usually due to a fragile or outdated plug-in . occasionally , Just forget to update a plug-in .
How do I delete Malware
There are many horror stories about people's blogs being hacked , But it turns out , It's a very simple thing .
I'm not WordPress Safety expert , So there may be a better way to do this , But the following steps show how easy it is to get my website cleaned up .
The first 1 Step - Scan your computer
I started scanning my computer , In case of any annoying malware , Use Malwarebytes( There is a free version ).
This is just a precaution , Everything is fine .
The first 2 Step - Confirm administrator information
Sometimes hackers will add new administrator accounts or change the email of existing administrator accounts .
I use PHPmyAdmin Checked all existing accounts , It allows me to check / Modify database entries .
No new accounts , The existing account information is correct .
If you need to do this , You may use PHPmyAdmin, But how to access it depends on your virtual host .
They should have some documents in this regard .
The first 3 Step -- Ask experts to help
I did some quick research , See who can help me solve this problem , I've seen a lot of good things about professional teams .
I used to use their free malware scanner , I follow their blog , Because they are good at finding plug-in vulnerabilities .

If only I could solve this problem for free , But it's not worth taking any risks .
The first 4 Step - Submit malware removal request
To make the ball roll , I submitted my malware removal request and FTP Details of .
The first 5 Step - My host is turned on again
Now the website has been cleaned up , I can ask my host to open my website .
They did another anti-virus scan , To make sure my website is clean , Then open it all again .
stay 30 Within minutes , Everything is working properly .
That's why I like to use WPX The reason for hosting my website -- They respond quickly to email support tickets .
In most cases 10 Within minutes . The problem usually lies in 20 It's solved in minutes . Or if I use instant chat , The problem will be solved directly .
Compared with other hosts I have used , It's amazing . Most of them are in 1-2 There will be no response to the support vote within days .
The next important steps
Although the infected website has been cleaned up , All websites on the server have been checked , But I still need to take some steps .
The first 6 Step - Update the password
I set about changing the password , Include :
host
WordPress Administrators
database
FTP
It also requires me to update on every website wp-config.php file , To make sure my website is FTP And continue to work after the details of the database are changed .

The first 7 Step - Activate server-side scanning
It is similar to their regular website monitoring , But it can scan more deeply , Make it more accurate .
Because my website is disabled , I have to wait , Until everything is normal , I can activate this function .
I can upload a file to each of my domain names , Click enable , We can start .
The first 8 Step - Run backup
My virtual host is backed up regularly , But one thing I have learned over the years is , You need multiple redundant backups .
There are several reasons for this :
The backup is running on their server -- This helps reduce server load , This is particularly important for people who use virtual hosts .
Backup is incremental --BlogVault Instead of running a full backup , Instead, only the modified files are copied . Again , Help reduce server load .
WordPress Manage dashboard - I can manage backups from a dashboard 、 Updates and more . This can save a lot of time , Especially when you have multiple websites .
The first 9 Step - to update WordPress、 Themes and plugins
Now? , I have backed up my website , It is to ensure WordPress And when all themes or plug-ins have been updated ,.
This is just a safety precaution , But just in case , It's important .
There have been several times , I updated the plug-in , The website crashed .
This is why regular backup is very important -- It's rare , But you shouldn't take the risk .
Fortunately, , The update did not cause any problems .
summary
You don't have to be an expert , There are many resources like those listed above , You can use them to protect your blog , And easier to trust . Nothing will be 100% Safe , But you need to be prepared as much as possible .
come from https://cn.bluehost.com/blog/security/15723.html
边栏推荐
- Cross-lingual Transfer of Correlations between Parts of Speech and Gaze Features 阅读笔记
- # 浏览器开发使用技巧
- Mmocr usage guide
- Web middleware log analysis script 3.0 (shell script)
- Network performance evaluation tool ping/mtr
- 1.30 升级bin文件添加后缀及文件长度
- “元气可乐”不是终点,“中国可乐”才是
- 【Code】剑指offer 03数组中重复的数字
- Lua basic grammar
- Android SQLite first groups and then sorts left concatenated queries
猜你喜欢

Docker advanced -mysql master-slave replication

聚势|海泰方圆亮相第五届数字中国建设峰会

The second China rust developer conference is coming, and the complete agenda has been exposed!

《nlp入门+实战:第四章:使用pytorch手动实现线性回归 》

Codeforces Round #810 (Div. 2)A~C

Inverse matrix block matrix

Kubernetes pod start process

NLP introduction + practice: Chapter 4: using pytorch to manually realize linear regression

Modify CSV

Google Gson用法详解
随机推荐
U++学习笔记 UStruct、UEnum声明以及函数库简单函数实现
[CTF] crypto preliminary basic outline
动态IP地址是什么?为什么大家会推荐用动态ip代理?
[secsha concept] large and small end
Inverse matrix block matrix
Tutorial on principles and applications of database system (054) -- MySQL query (16): usage of date time function
手游多开用模拟器多开游戏如何切换IP搬砖
网络文件传输之零拷贝
Mulda: a multilingual data augmentation framework for low resource cross linguistic ner reading notes
Detailed explanation of at and crontab commands of RHCE and deployment of Chrony
更换IP地址常见的4种简单有效的方法
Detailed explanation of at and crontab commands of RHCE and deployment of Chrony
SQL的CASE WHEN
Game thinking 17: Road finding engine recast and detour learning II: recast navigation grid generation process and limitations
Fastjason handles generics
TV software burning
FreeBSD bNXT Ethernet driver source code reading record 2:
Tutorial on the principle and application of database system (057) -- MySQL exercises
JDBC connection database (idea version)
链表相关面试题